Handbook of Biometric Anti-Spoofing

@inproceedings{Marcel2014HandbookOB,
  title={Handbook of Biometric Anti-Spoofing},
  author={Sbastien Marcel and Mark S. Nixon and S. Li},
  booktitle={Advances in Computer Vision and Pattern Recognition},
  year={2014}
}
Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems and in deriving countermeasures to these attacks. Topics and features: provides a detailed introduction to the field of biometric anti-spoofing and a thorough review of the associated literature; examines spoofing attacks against five biometric modalities, namely, fingerprints, face, iris, speaker and gait; discusses anti… Expand
A review of iris anti-spoofing
TLDR
The goal of this paper is to provide a comprehensive and structured overview on the work that has been carried out over the last decade in the field of iris anti-spoofing to provide biometric researchers an overall picture of the current panorama following a systematic approach. Expand
Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned
TLDR
This tutorial article presents an introduction to spoofing and antispoofing research, describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofs and countermeasures, and outlines research priorities for the future. Expand
Biometric Antispoofing Methods: A Survey in Face Recognition
TLDR
The goal of this paper is to provide a comprehensive overview on the work that has been carried out over the last decade in the emerging field of antispoofing, with special attention to the mature and largely deployed face modality. Expand
Provoking security: Spoofing attacks against crypto-biometric systems
TLDR
This paper presents crypto-biometric techniques, analyzing comparatively the different categories according to the main goal of the design and the methodology used in, and suggests a novel bimodal system, able to reject such kind of attacks. Expand
A Survey on Antispoofing Schemes for Fingerprint Recognition Systems
TLDR
The literature is reviewed and the state of the art in fingerprint antispoofing is presented, which includes several countermeasures that discriminate between live fingerprints and spoof artifacts. Expand
A new Foe in biometrics: A narrative review of side-channel attacks
TLDR
An attempt to draw the attention of the community towards this potential threat of side-channel attacks by placing SCAs within the overall context of biometric vulnerabilities, reviewing the state of the art, presenting possible countermeasures against them, and providing a quick look into the future regarding the challenges to be faced by biometrics to effectively confront this new adversary. Expand
50 years of biometric research: Accomplishments, challenges, and opportunities
TLDR
Unlocking the full potential of biometrics through inter-disciplinary research in the above areas will not only lead to widespread adoption of this promising technology, but will also result in wider user acceptance and societal impact. Expand
A Survey on Anti-Spoofing Methods for Facial Recognition with RGB Cameras of Generic Consumer Devices
TLDR
This survey thoroughly investigates the face Presentation Attack Detection methods, that only require RGB cameras of generic consumer devices, over the past two decades and presents an attack scenario-oriented typology of the existing face PAD methods. Expand
A SURVEY ON SMARTPHONE PROTECTING IDENTIFICATION AGAINST ATTACKS USING BIOMETRIC AUTHENTICATION SYSTEMS
TLDR
In this survey, the existing BAS techniques are explored and classified focusing on the security issues that they are used for and the corresponding solutions provided in this domain. Expand
years of biometric research : Accomplishments , challenges , and opportunities ✩
Biometric recognition refers to the automated recognition of individuals based on their biological and behavioral characteristics such as fingerprint, face, iris, and voice. The first scientificExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 101 REFERENCES
On the effectiveness of local binary patterns in face anti-spoofing
TLDR
This paper inspects the potential of texture features based on Local Binary Patterns (LBP) and their variations on three types of attacks: printed photographs, and photos and videos displayed on electronic screens of different sizes and concludes that LBP show moderate discriminability when confronted with a wide set of attack types. Expand
Anti-spoofing in Action: Joint Operation with a Verification System
TLDR
Techniques for decision- level and score-level fusion to integrate a recognition and anti-spoofing systems are studied, using an open-source framework that handles the ternary classification problem (clients, impostors and attacks) transparently. Expand
Face spoofing detection through partial least squares and low-level descriptors
TLDR
This paper describes an anti-spoofing solution based on a set of low-level feature descriptors capable of distinguishing between ‘live’ and ‘spoof’ images and videos, and explores both spatial and temporal information to learn distinctive characteristics between the two classes. Expand
Robustness of multimodal biometric fusion methods against spoof attacks
TLDR
This paper proposes two novel fusion schemes that can increase the security of multimodal biometric systems when one of the modes is successfully spoofed, one is an extension of the likelihood ratio based fusion scheme and the other uses fuzzy logic. Expand
Motion-based counter-measures to photo attacks in face recognition
TLDR
A publicly available PHOTO-ATTACK database is introduced, and a new technique of counter-measure solely based on foreground/background motion correlation using Optical Flow that outperforms all other algorithms achieving nearly perfect scoring with an equal-error rate of 1.52% is proposed. Expand
Verifying liveness by multiple experts in face biometrics
TLDR
A holistic liveness detection paradigm that collaborates with standard techniques in 2D face biometrics is suggested that shows that many attacks are avertible via a combination of anti-spoofing measures. Expand
Video-Based Face Spoofing Detection through Visual Rhythm Analysis
TLDR
This work presents a solution to video-based face spoofing to biometric systems based in the analysis of global information that is invariant to video content and takes advantage of noise signatures generated by the recaptured video to distinguish between fake and valid access. Expand
An Analysis of Minutiae Matching Strength
TLDR
The potential security holes in a biometrics-based authentication scheme are outlined, the numerical strength of one method of fingerprint matching is quantified, then how to combat some of the remaining weaknesses are discussed. Expand
Computationally Efficient Face Spoofing Detection with Motion Magnification
TLDR
A new approach for spoofing detection in face videos using motion magnification using Eulerian motion magnification approach, which improves the state-of-art performance, especially HOOF descriptor yielding a near perfect half total error rate. Expand
On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals
TLDR
A new approach based on artificial, tone-like signals which provoke higher ASV scores than genuine client tests is introduced, demonstrating the importance of efforts to develop dedicated countermeasures to protect ASV systems from spoofing. Expand
...
1
2
3
4
5
...